Download - TANY A ANDERSEN, individually and on ) v. )
UNITED STATES DISTRCT COURTDISTRICT OF OREGON
TANY A ANDERSEN, individually and on )behalf of aU others similarly situated. )
)
)Plaintiff ))v. )))
ATLANTIC RECORDING )CORPORATION, a Delaware curpration; )PRIORITY RECORDS, LLC. a California )limited liability compay; CAPITOL )RECORDS, INC., a Delaware corporation; )VMG RECORDINGS, INC.. a Delaware )corpration; and BMO MUSIC, a New )York general parnership; RECORDING )INDUSTRY ASSOCIATION OF )AMERICA; SAFENET, INC., f/kJa )MEDIA SENTRY, INC., a Delaware )corpration; SETTLEMENT SUPPORT' )CENTER, LLC, a Washington limite )liabilty company )
)Defendants. )
No. CY 07-934 BR
DECLARATION OFMATTHEW J. OPPENHEIM
i, Matthew J. Oppenheim, declare and testify as follows:
1. I am the principal of The Oppenheim Group LLP and an attorney admitted to
practice law in the States of Maryland and New York, as well as the District of Columbia.
In varous different capacities, i have represented the record industr, including the
record cumpany defendats in this cas. for over ten year. Among my retentions has
been oversight of the record industry's peer-to-peer enforcement progr (the
"Enforcement Progra"). i submit this declaration, which briefly presents certain limited
and indisputable facts, in opposition. to Plaintiff's Motion for Class Certification.
1/1391869 vI den
2, The Record Companies' nationwide Enforcement Progr was conducted in two
phases, In the first phas, the Record Companies principally sought to enforce their
copyrghts against people who used commercial Internet Serice Providers ("ISPs"), such
as Verizon Online, to unlawflly upload or download copyrghted sound recordings. In
most caes during this first phas, once MediaSentr documented an Internet Protocul
("IP") address used for infringement, the Record Companies initiated a Doe lawsuit
against the registered owner of the IP address. The Record Companies then would seek
permission from the court presiding over a Doe case to subpoena the ISP for the name of
that registered owner. When sending these subpoenas. the Record Companies requested
ISPs to notify the registered owners that the Record Companies were seeking to identify
them, so that these owners could, if they so chose, contact the Record Companies and
begin a dialogue. Afer the Record Companies leared the registered owners' name, they
would send a Presuit Notitlcaiion Letter ("PNL") to the person and seek to initiate a
dialogue to resolve the copyright claims.
3. The seond phase ofthe Enforcement Program focused on people who used the
internet connections of colleges and universities to unlawfully upload or do..,oload
copyrighted sound recordings. Many colleges and universities are themselves ISPs; they
assign IP addresses to their individuaJ students and faculty members just as commercial
ISPs do. In this second phase, the Record Companies sent letters to the ISP-provider
schools, assigning unique 10 numbers to each IP address that had ben used for
infrngement, and asked the schools to fotv'ard the letters to the students or employees to
whom each address had ben assigned.
4. Upon receiving the Record Companies' letters, most colleges or universities
forwarded them to the paicular students or faculty members to whom the IP addresses
used for infringement were registered. Those students and faculty could and did
communicate directly with the Record Companies to settle their claims. These
discussions occured either anonymously (with the letter recipients identifying
themselves only by means of the ID numbers assigned to their cases, as occured in about
1300 cases) or by name. Some communicated telephonically, while others used an online
system to communicate with the Record Companies and settle their cases. In those
second-phase cases where the alleged infringers setted anonymously, the Record
Companies never leared, and currently do not know, their names.
5. Ifan educational institution did not forward the Record Companies' letters to the
students and faculty to whom the IP addresses in question were registered, the Record
Companies often initiated Doe lawsuits and, with judicial pern1ission, issued subpuenas
to learn the identities otthe registered o"vners. In some other cases, the Record
Compaies took no further action, and the students did not learn of the Record
Companies' pursuit of a claim against them.
6. The information provided below regarding the individuals contated durng the
Enforcement Program, and the ways Ìn which their cases were resolved, are calculations
based upon my review of our case management database. Because this datba..e was not
designed to calculate the number of cases that were resolved at a particular stae or in a
paricular manner, there may be slight deviations below from the actual numbers.
7. Durng both phases of the Enforcement Program, the Record Companies
contacted over 18,000 people. Approximately i 2,500 ofthese people were identified by
means of Doe suits and subpoena.. to ISPs. Another 5,100 received PNLs forwarded by
their ISPs. Approximately 600 peoplc were sent PNLs after they had been identified by
other means, such as affdavits fTOm the registered ovmers of IP addresses naming these
others as the people who used the atlants' computers for unlawful copying.
8. In about 4,000 of the 18,000 cases descnbed above, the people responsible for the
IP addresses setted the claims either .before they were identified by their ISP or in
response to a PNL that was forwarded to them by their ISP. Slightly morc tha half of
these 4,000 cases were college and university students or faculty members who settled
before being named in a Doe suit or any other complaint.
9. Of the 18,000 cases, approximately 7,000 resulted in a non-Doe lawsuit against a
named individuaL. The rest ended without litigation, either because the PNL recipient
settled. or because the Record Companies, for any number of reasons, chose not to sue.
10. Of the cases in which the Record Companies tied a lawsuit against a named
person, in more than 100 instances, the defendants attempted to assert counterclaims
against the Record Companies. These counterclaims routinely have been dismissed ao;
violative of the Noerr-Pennington doctrine, or on other grounds. The Record Companies
discussed a number of their cases in their Motion for Summar Judgment, and other
decisions in their favor have been issued since then. Atthed as Exhibit A is the Notice
of Electronic Filing of an order, entered June 15,2009, dismissing a defendant's abuse of
process counterclaim in Capitol Records. Inc. v. Alaujan, No. 1:03-cv-l 1661 (D. Mass.
electronic order entered June 15, 20(9). Att.iched as Exhibit 8 is another order, dated
June 2, 2009, dismissing a defendant's civil conspiracy counterclaim in Ailantic
Recording Corp. v. Raleigh, No. 4:06-CY -1708 (CEJ) (E.O. Mo. June 2, 2009).
1 i . Other defendants, while not asserting counterclaims, have in the course of their
defenses offered arguments identical or similar to those Ms. Andersen makes in this cae.
These arguments also routinely have been rejected. Again, the Record Companies
discussed many of these caes in their Motion for Summary Judgment, but again, there
have been more decisions in their favor since then. Attached as Exhibit C, for example,
is an Order, dated June I 1,2009, rejecting claims that MediaSentry's activities amounted
to "private investigation" in violation of state and federal law in Capitol Records, Inc. v.
Thomas-Rassei, No. 06.1497 (MJDfRLE) (D. Minn. June 11, 2009).
12. In cases where PNL recipients settled beföre being named in individual lawsuits,
the people who settled did not receive releases of claims. The Record Companies
promised not to pursue any further action against setting persons, and kept those
promises. In the event that a settling person were to assert a claim against the Record
Companies, however - either themselves or derivatively, such as through the class
action Ms. Andersen seeks to pursue on their behalf - the Record Companies would
likely defend the actiùn by demonstrating that these claimants infringed, and thus canot
claim "abuse of process" or any of the other torts Ms. Andersen asserts. Upon
demonstrating this infringement in court. the Record Companies would have the legal
right to daages far in excess of prior settlement payments. Indeed, in the overwhelming
number of instances, the settlement amounts were only a fraction of the minimum
statutory daages that would have been due had the case actully been litigated.
13. In cases where people settled' only after the Record Companies had sued them by
name, the Stipulations to Judgment and Permanent Injunction that memorialized most
settlements included provisions in which the defendats "irrevocably and fully waive(dJ
any and all right to appeal th( el Judgment and Permanent Injunction, to have it vacated or
set aside. to seek or obtain a new trial thereon, or otherwise to attack in any way, directly
or collaterally, its validity or enforceability." Attached as Exhibit D is an example of a
Stipulation to Judgment and Permanent Injunction which was entered into with Oregon
Resident Thomas Burgess. Exhibit D is typical of these stipulations; substatially all
other stipulations entered around the country contain similar language. The Record
Companies' position is tht these stipulations ba the signatories from puruing, either
directly or derivatively, the tyes of claims Ms. Andersen seeks to assert in this case.
14. In lawsuits that entered the discovery phase, there were many instances in which
the Record Companies sought discoVery, the defendants opposed paricular requests, and
federal judges agreed n,~th the Record Companies and ordered their requested discovery.
Attached as Exhibit E is an Order dated October 27, 2006, granting the Record
Companies' motion in part to compel the defendant to produce her computer for copying
and inspection in Sony SMG Music Entin 'to et al v. Arellanes. No. 4:05-CV -328 (E.D.
Tex. Oct. 27,2006). Attached as Exhibit F is an Order dated Januay 25,2006, granting
the Record Companies' motion to compel the detèndant to produce her computer for
copying and inspection in Arista Recordç, LLC et al v. Tschirhart, No. SA05CA03720G
(W.O. Tex. Jan. 25, 20(6). Attached as Exhibit G is a Notice ofElecironic Filing ofan
Order, dated Janua 16,2008, granting the Record Companies' motion to compel the
defendat to produce his external hard drive and denying defendant's request to deem his
deposition waived based on what he believed to be unreasonable delay in L.iliifG
Recordings. Inc. et al v. Lindor, NO.1 :05-cv-1095 (E.D.N.Y. Jan. 16,2008). These are
jus three examples; the Record Companies could produce many more if the Cour would
find them useful to its consideration of Ms. Andersen' s motion.
15. In the only case to go to trial since the inception of the Enforcement Progrm, a
tèderal jury returned a $1,92 millot; verdict in the Record Companies' favor against
Januie Thomas-Rasset, another individual that was sued as par of
the Enforcement
Program. Attached as Exhibit H is a Judgment in a Civil Case, dated June 19.2009, in
Capitol Records. Inc. v. Thomas-Rassel, No. 06-1497 (MJDIRE) (D. Minn. June 19,
2009).
16. Attacht=d as Exhibit I is an excerpt from the Deposition of Christopher Connelly,
whìch took place on May 28. 2009.
i 7. I declare under penalty otperjury under the laws ofthc United States of America
that the foregoing is true and correct.
Executed thiJ.~y of June, 2009 at Y~1a.~J r:1__.
~Ma~~ J/Oppenh. / \c "
Page 1 of 5
From: [email protected] (mailto :[email protected])Sent: Monday, June 15, 20098:02 AMTo: [email protected]: Activity in Case 1:03-cv-11661-NG Capital Records, Inc. et al v. Alaujan Order on Motion to Dismiss
This is an automatic e-mail message generated by the CMÆCF system. Please DO NOT
RESPOND to this e-mail because the mail box is unattended.***NOTE TO PUBLIC ACCESS USERS*** Judicial Conference of the United States policypermits attorneys of record and parties in a case (including pro se litigants) to receive one freeelectronic copy of all documents fied electronically, if receipt is required by law or directed by thefier. PACER access fees apply to all other users. To avoid later charges, download a copy of eachdocument during this first viewing. However, if the referenced document is a transcript, the freecopy and 30 page limit do not apply.
United States District Court
District of Massachusetts
Notice of Electronic Filng
The following transaction was entered on 6/15/2009 at 10:01 AM EDT and fied on 6/15/2009Case Name: Capital Records, Inc. et al v. AlaujanCase Number: 1 :03:çy-llt5t51Filer:Document Number: No document attached
Docket Text:Judge Nancy Gertner: Electronic ORDER entered granting (670) Motion to DismissCounterclaims Asserted By Defendant Joel Tenenbaum by All Plaintiffs; denying (693)Motion to Add the Recording Industry Association of America (RIAA) as a Part to
Defendant's Amended Counterclaim by Joel Tenenbaum. "The Plaintiffs Motion toDismiss Counterclaims (#670) is GRANTED. Defendants Motion to Join the RIAA (#693)is DENIED as moot. The Supreme Court has held that no federal cause of action forabuse of process exists. Wheeldin v. Wheeler, 373 U.S. 647, 652 (1963); see also Berisicv. Winckelman, 2003 WL 21714930, at *2 (S.D.N.Y. 2003); Voors v. National Women'sHealth Org., Inc., 611 F.Supp. 203, 207 (D.C. Ind. 1985) (refusing to find a federalquestion even where defendants alleged that the court process abused was the federalcourt process). Even if this Court were to decide that Wheeldin were inapposite basedon its facts, it stil would reject the Defendant's federal abuse of process claim for thevery same reason that his state abuse of process claim fails. Any abuse of process
6/17/2009 EXHIBIT APage i of 5
Page 2 of 5
necessarily involves an attempt to coerce a defendant into surrendering some collateralbenefit through court process. It "consists of using process to accomplish someulterior purpose for which it was not designed or intended, or which (i)s not thelegitimate purpose of the particular process employed." Davidson v. Cao, 211 F.Supp.2d264,287 (D. Mass. 2002) (citations omitted). In this quality, abuse of process resemblesextortion. See Restatement (Second) of Torts s. 682. Yet the Defendant has identified nosuch ulterior motive or purpose here. Settlements driven by large potential damagesand costly lawyers' fees are not the equivalent of extortion -- they are the calculus facedby almost every civil defendant. Even if the Court views file-sharing lawsuits as unwiseand the statutory penalties a remarkably poor policy judgment, the objectives sought bythis suit are well within those contemplated by Congress and the Copyright Act, 17U.S.C. s. 101 et seq. The Plaintiffs seek to recover damages for copyright infringementexpressly authorized by statute, and to deter others' infringing activities -- a purposethat both Congress and the Supreme Court have credited in this very context. See H.R.Rep. No. 106-216, at 3 (1999); Metro-Goldwyn-Mayer Studios, Inc. v. Grokster, Ltd., 545U.S. 913, 940 (2005) (approving contributory liabilty for copyright infringementoccurring on file-sharing networks, based on "evidence of infringement on a giganticscale"). The Defendant's allegation that the Plaintiffs, through these lawsuits, seek to"close the Net" amounts to little more than a claim that they have sought to broadlydeter the unauthorized online distribution of copyrighted sound files. Put simply, theeffort to deter an activity prohibited by Congress -- by attempting to enforce preciselythe rights created by Congress -- does not constitute an abuse of process. See Vahlsingv. Commercial Union Ins. Co., Inc., 928 F.2d 486,490 (1st Cir. 1991) ("(w)hen process isemployed for the purpose for which the law intends its use, no abuse of processoccurs."). The Defendant appears to believe that this lawsuit constitutes an "abuse ofprocess" because it is part of a wider campaign targeting file-sharing activities, onewhich has swept up large numbers of young people accused of downloading anddistributing copyrighted works, many of whom cannot afford counsel. The Court hasexpressed its views on the Plaintiffs' litigation campaign before. But abuse of process,as the cause of action is defined, does not turn on the identity of the defendants, theirabilty to hire an attorney, nor their inclination to settle the claims against them.Congress has handed the Plaintiffs a massive hammer to combat copyrightinfringement, and they have chosen to use it. That choice, whether wise or unwise, doesnot amount to an abuse of process." (Gaudet, Jennifer)
1:03-cv-1l661 Notice has been electronically mailed to:
Matthew H. Feinberg [email protected], [email protected]
Matthew A. Kamholtz [email protected]
Michael A. Kehoe [email protected]
Kenneth 1. Parsigian [email protected]
Charles 1. DiMare [email protected], [email protected]
Mary T. Sullivan [email protected], [email protected], [email protected]
Terence K. Ankner [email protected]
6/17/2009EXHIBIT APage 2 of5
Page 3 of 5
Ronald N. Whitney [email protected]
John 1. Regan [email protected]
Daniel T. Doyle [email protected]
Mark A. Walsh [email protected]
Donna L. Conley [email protected]
Seth M. Yurdin [email protected]
Daniel 1. Clohert [email protected], [email protected],[email protected], vstei [email protected]
Charles Nesson [email protected], [email protected], [email protected],mhardi [email protected], [email protected]
Raymond Sayeg, Jr [email protected]
Theodore G. Fletcher [email protected]
Simon B. Mann [email protected]
Eve G. Burton [email protected], [email protected]
Laurie Rust [email protected], [email protected], [email protected]
Timothy M. Reynolds [email protected], [email protected], [email protected]
Michelle Bennett [email protected]
Debra B. Rosenbaum [email protected]
Jennifer L. Dawson [email protected]
James E. [email protected]
Matthew C. Sanchez [email protected]
Anna V. Volftsun [email protected]
Victoria L. Steinberg [email protected]
Free Softare Foundation [email protected]
1:03-cv-1l661 Notice wil not be electronically mailed to:
Interscope Records
6/17/2009EXHIBIT APage 3 of5
Page 4 of 5
Maverick Recording Company
Warer Bros. Records Inc.
Charles M. MacLean869 Concord StreetFramingham, MA 01701
Charmaine M. BlanchardLaw Offces of John 1. McGlynn, Jr.4 Norman StreetSalem, MA 01970
Diane Briggs
7 Ponkapoag WayCanton, MA 02021
Diane Cabell1587 Massachusetts AvenueCambridge, MA 02138
Douglas T. Evans58 Main StreetTopsfield, MA 01983
George W. Gray, JrLaw Offce of George W. Gray Jr.110 Haverhill St.Suite 315Amesbury, MA 01913
John Palfrey1587 Massachusetts AvenueCambridge, MA 02138
John 1. McGlynn, JrLaw Offce of John 1. McGlynn, Jr.4 Norman StreetSalem, MA 01970
Katheryn 1. CoggonHolme Roberts & Owen LLPSuite 41001700 Lincoln StreetDenver, CO 80203-4541
Michael Fitzgerald11 Pineridge Road
6/17/2009 EXHIBIT APage 4 of5
Page 5 of 5
Wilmington, MA 01887
Michael ManziLaw Offce of Michael Manzi59 Jackson StreetLawrence, MA 01840
Paul A. ShneyerShneyer & Associates Ltd.1991 Broadway OFC 2New York, NY 10023-5828
Steven KarolKarol & Karol424 Adams StreetMilton, Ma 02186
Yevgeniya Shnayder
31 Star RoadNewton, MA 02465
6/17/2009EXHIBIT APage 5 of5
UNITED STATES DISTRICT COURTEASTERN DISTRICT OF MISSOURI
EASTERN DIVISION
Defendant.
))))))))))
No. 4:06-CV-170S (CEJ)
ATLANTIC RECORDING CORP.,et aI.,
Plaintiffs,
vs.
JENNA RALEIGH,
MEMORANDUM AND ORDER
This matter is before the Court on plaintiffs' motion to strike, or, in the
alternative, to dismiss defendant's amended counterclaims. Defendant has responded
and the issues are fully briefed.
I. Background
Plaintiffs are copyright owners or licensees of exclusive rights with respect to
certain copyrighted sound recordings. Defendant is an individual, who resides in the
Eastern District of Missouri.
On November 2S, 2006, plaintiffs filed a complaint pursuant to 16 U.S.c. § 101,
et seq., seeking damages and equitable relief. On September 5,2007, defendantfiled
an answer and counterclaims asserting violation of the Racketeer Influenced and
Corrupt Organizations Act (RICO), lS U.S.c. § 1962(c), (Count I), conspiracy to violate
RICO (Count II), fraudulent misrepresentation (Count III), prima facie tort (Count IV),
and conspiracy (Count V). On August lS, 200S, the Court granted plaintiffs' motion
to dismiss defendant's counterclaims for failure to state a claim, and denied
defendant's motion for leave to amend her counterclaims. On September 12, 200S,
the Court issued a Case Management Order, which stated that "(a)ny joinder of
additional parties or amendment of pleadings shall be no later than November 17,
EXHIBIT BPage i of?
2008. Thereafter, the parties must file a motion for leave to join additional parties or
to amend pleadings." (Doc. #49, at 1) (emphasis in original). On November 17,
200S, defendant filed amended counterclaims, which included the same counterclaims
she had previously asserted, along with three new counterclaims for trespass to
chattels (Count VI), violation of the Computer Fraud and Abuse Act (CFAA), lS U.S.c.
§ 1030, (Count VII), and conspiracy to commit trespass to chattel and to violate the
CFAA (Count VIII). (Doc. #52).
II. Discussion
Plaintiffs move to (1) strike defendant's counterclaims in their entirety for failure
to seek leave, pursuant to Rule 15(a), Fed.R.Civ.P.; (2) strike Counts I, II, III, IV, and
V of defendant's amended counterclaims and the re-plead factual allegations upon
which the counterclaims are based because they were previously dismissed; and (3)
dismiss Counts VI, VII, and VIII of defendant's amended counterclaims for failure to
state a cause of action upon which relief can be granted, pursuant to Rule 12(b)(6),
Fed.R.Civ.P. The Court will not address defendant's trespass to chattels counterclaim
(Count VI) because defendant states that she wishes to withdraw and dismiss it.
A. Plaintiffs' Motion to Strike Defendant's AmendedCounterclaims in their Entirety
Rule 15(a), Fed.R.Civ.P., "governs the pretrial amendment of pleadings and
states that where an amendment is not sought 'as a matter of course'-as defined by
the Rule-'a party may amend its pleadings only with the opposing party's written
consent or the court's leave.'" Sherman v. Winco Fireworks, Inc., 532 F.3d 709, 715
(Sth Cir. 200S), citing Fed.R.Civ.P. 15(a)(2). Rule 13(f), Fed.R.Civ.P., states that
"(t)he court may permit a party to amend a pleading to add a counterclaim if it was
omitted through oversight, inadvertence, or excusable neglect or if justice so requires."
- 2 -
EXHIBITBPage 2 of7
Plaintiffs move to strike defendant's amended counterclaims in their entirety for
failure to seek leave, pursuant to Rules 15(a) and 13(f), Fed.R.Civ.P. In their reply,
plaintiffs concede that "the Court granted both parties leave to amend their pleadings
up to and including November 17, 2008." (Doc. #70, at 4). Pursuant to the Court's
order, defendant filed her amended counterclaims on November 17,2008. However,
plaintiffs contend that, in order for defendant to add the counterclaims in Counts VII
and VIII, Rules 13(f) and 15(a), Fed.R.Civ.P., required defendant to seek leave of
court. Plaintiffs' contention is without merit. As stated above, the plain language of
Rule 13 "permits a party to amend a pleading to add a counterclaim . . . ."
Fed.R.Civ.P. 13(f) (emphasis added). Therefore, because the Court granted both
parties leave to amend their pleadings no later than November 17, 2008, and
defendant timely fied her amended counterclaims, the Court will not strike defendant's
amended counterclaims in their entirety.
B. Plaintiffs' Motion to Strike Defendant's AmendedCounterclaims I through V and the Reasserted Allegations
Under Fed.R.Civ.P. 12(f), a court may "order stricken from any pleading any
insufficient defense or any redundant, immaterial, impertinent, or scandalous matter."
Motions to strike on this basis are not favored and are infrequently granted, because
they propose a drastic remedy. Southwestern Bell Telephone, L.P. v. Missouri Public
Service Comm'n, 461 F.Supp.2d 1055, 1064 (E.D. Mo. 2006), citing Stanbury Law
Firm, P.A., v. Internal Revenue Serv., 221 F.3d 1059, 1063 (8th Cir. 2000). There is
general judicial agreement that motions to strike should be denied "unless the
challenged allegations have no possible relation or logical connection to the subject
matter of the controversy and may cause some form of significant prejudice to one or
- 3 -
EXHIBITBPage 3 of?
more of the parties to the action." 5C Charles Alan Wright & Arthur R. Miller, Federal
Practice & Procedure § 1382.
Plaintiffs contend that, "(iJn her (aJmended (cJounterclaims i-v, (dJefendant re-
alleges counterclaims which were dismissed by the Court on August 18, 2008." (Doc.
#61, at 6). Because "these counterclaims, and the factual allegations on which they
were based, have already been dismissed, they are redundant, immaterial, and
impertinent to this case and should be stricken under Rule 12(f)." Id. In her amended
counterclaims, defendant admits that Counts i through V were previously dismissed
by the Court. However, she states that she re-alleged the counterclaims in order to
preserve the issue of their dismissal for appeaL. Because of the previous dismissal of
the counterclaims and the factual allegations upon which they were based, Counts i,
II, Ill, iV, an V of defendant's amended counterclaims and the factual allegations upon
which these counterclaims are based (i.e., paragraphs 11, 13-16, 18-26, 28-32, 34-
45, 47, 50-69, 77-78, 86-87, and 89-91) will be stricken.
C. Plaintiffs' Motion to Dismiss Defendant's AmendedCounterclaims VII and VIII
The purpose of a motion to dismiss under Rule 12(b)(6) of the Federal Rules of
Civil Procedure is to test the legal sufficiency of the complaint. The factual allegations
of a complaint are assumed true and construed in favor of the plaintiff, "even if it
strikes a savvy judge that actual proof of those facts is improbable." Bell Atl. Corp.
v. Twombly, --- U.S. ---, 127 S. Ct. 1955, 1965 (May 21, 2007), citing Swierkiewicz
v. Sorema N.A., 534 U.S. 506, 508 n.l (2002); Neitzke v. Williams, 490 U.S. 319, 327
(1989) ("Rule 12(b)(6) does not countenance. . . dismissals based on a judge's
disbelief of a complaint's factual allegations"); Scheuer v. Rhodes, 416 U.s. 232, 236
(1974) (a well-pleaded complaint may proceed even if it appears "that a recovery is
- 4 -
EXHIBITBPage 4 of7
very remote and unlikely"). The issue is not whether the plaintiff will ultimately
prevail, but whether the plaintiff is entitled to present evidence in support of his claim.
lQ A viable complaint must include "enough facts to state a claim to relief that is
plausible on its face." Bell At!. Corp., 127 S. Ct. at 1974. See also id. at 1969 ("no set
of facts" language in Conley v. Gibson, 355 U.S. 41, 45-46 (1957), "has earned its
retirement."). "Factual allegations must be enough to raise a right to relief above the
speculative leveL." lQ at 1965.
1. Count VII: Violation of the CFAA
In her seventh amended counterclaim, defendant asserts that plaintiffs violated
18 U.S.c. § 1030. Defendant does not identify any specific provision of the CFAA that
plaintiffs allegedly violated. Examination of Count VII leads the Court to conclude that
defendant's allegations are based on 18 U.S.c. § 1030(a)(5)(C). Under this section,
a violation occurs when a person "intentionally accesses a protected computer without
authorization, and as a result of such conduct, causes damage and loss." The CFAA
defines: (1) "protected computer" as "a computer-- which is used in or affecting
interstate. . . commerce or communication(;) and (2) "damage" as "any impairment
to the integrity or availability of data, a program, a system or information(.)" 18
U.S.c. §§ 1030(e)(2)(B), 1030(e)(8). Additionally, the CFAA provides that:
(T)he term "loss" means any reasonable cost to any victim, including thecost of responding to an offense, conducting a damage assessment, andrestoring the data, program, or information to its condition prior to theoffense, and any revenue lost, cost incurred, or other consequentialdamages incurred because of interruption of service(.)
18 U.S.c. § 1030(e)(11).
Plaintiffs argue that defendant has failed to allege sufficient facts to show that:
(1) plaintiffs accessed defendant's computer without authorization; and (2) defendant
suffered damage and loss. The Court agrees. Defendant alleges that "(p)laintiffs . .
- 5 -
EXHIBIT BPage 5 of?
. intentionally accessed (her) computer(.)" (Defendant's Am. Countercl., para. 132;
Doc. #52, at 38). However, defendant offers no supporting facts to bolster this
conclusory allegation. Defendant also alleges that her "computerr) and computer
systems. . . were used in interstate commerce and/or communication." (Defendant's
Am. Countercl., para. 133; Doc. #52, at 38). However, defendant provides no specific
facts to explain how her computer was used in or affected interstate commerce. 1 As
such, defendant provides a conclusory allegation that her computer is a "protected
computer" within the scope of the CFAA. Finally, defendant alleges that "(plaintiffs')
conduct . . . resulted in impairment to the integrity and/or availability of data, a
program, a system or information on (her) computer(.)" (Defendant's Am. Countercl.,
para. 133-34; Doc. #52, at 38). With the exception of a few additional words and
punctuation marks, this allegation only contains the statutory definition of the term
"damage." See 18 U.S.c. § 1030(e)(8). Moreover, defendant offers no supporting
facts to describe any impairment to her computer's data, programs, system, or
information. In sum, defendant's unsupported conclusory allegations contain nothing
more than "a formulaic recitation of the elements" of a claim under 18 U.S.c. §
1030(a)(5)(C).2 Bell Atl. Corp., 127 S. Ct. at 1965. Therefore, defendant's CFAA
lIn her brief in opposition to plaintiffs' instant motion, defendant alleges that
"(t)here is no question that (her) computer was used in a manner that affectsinterstate communication-it was through the computer's connection to the internet.. . . Thus, the computer was 'protected' for purposes of the statute." (Doc. #67, at6). However, defendant does not mention this allegation in her amendedcounterclaims. As such, because '''matters outside the pleading' may not beconsidered in deciding a Rule 12 motion to dismiss," the Court will not consider thisallegation. Enervations, Inc. v. Minn. Mining & Mfg. Co., 380 F.3d 1066, 1069 (8th Cir.
2004).
2In her response, defendant alleges that she has sustained a "loss" in excess of
$5,000. (Doc. #67, at 8). However, this allegation does not appear in defendant'samended counterclaim. As such, the Court will not consider this assertion. See supranote 1 and accompanying text.
- 6 -
EXHIBITBPage 6 of7
counterclaim fails to state a claim for which relief can be granted, and the Court will
dismiss Count VII of defendant's amended counterclaims.
2. Count VIII: Civil Conspiracy
In her last counterclaim, defendant alleges that plaintiffs "conspired and agreed
to commit the unlawful acts alleged in Count() Vii(.)"3 (Defendant's Am. Countercl.,
para. 139; Doc. #52, at 40). Defendant alleges that, as a result of plaintiffs'
conspiracy, she "suffered damages and incurred costs including legal fees."
(Defendant's Am. Countercl., para. 142; Doc. #52, at 40). Because Count VII is the
sole basis for defendant's civil conspiracy claim, and the Court has found that Count
VII fails to state a claim upon which relief can be granted, Count VIII must also be
dismissed.
Accordingly,
IT IS HEREBY ORDERED that plaintiffs' motion to strike, or, in the alternative,
to dismiss defendant's amended counterclaims (Doc. #60) is granted.
An order of partial dismissal will accompany this Memorandum and Order.
.~
Dated this 2nd day of June, 2009.
3In the body of Count VIII, defendant alleges that her civil conspiracy claim isbased on the "unlawful acts in Counts VI and VII above." (Defendant's Am. Countercl.,para. 139; Doc. #52, at 40). However, as noted above, defendant withdrew Count VIfor trespass to chattels. See (Doc. #67, at 5 n.3).
- 7 -
EXHIBITBPage 7 o£1
UNITED STATES DISTRICT COURTDISTRICT OF MINNESOTA
CAPITOL RECORDS INC.,a Delaware corporation;SONY BMG MUSIC ENTERTAINMENT,a Delaware general partnership;ARISTA RECORDS LLC,a Delaware limited liabilty company;INTERSCOPE RECORDS,a California general partnership;WARNER BROS. RECORDS INC.,a Delaware corporation; andUMG RECORDINGS, INC.,a Delaware corporation;
Plaintiffs,
v. MEMORANDUM OF LAW & ORDERCivil File No. 06-1497 (MJD/RLE)
JAMMIE THOMAS-RASSET,
Defendant.
Andrew B. Mohraz, David A. Tonini, and Timothy M. Reynolds, Holme Roberts& Owen, LLP; Felicia J. Boyd, Kara L. B. Barrow, and Mary Andreleita Walker,Faegre & Benson, LLP; and Mattew J. Oppenheim, Oppenheim Group, LLP;counsel for Plaintiffs.
Joe Sibley and K. A. D. Camara, Camara & Sibley, LLP, and Garrett D.Blanchfield, Jr., Reinhardt Wendorf & Blanchfield, counsel for Defendant.
1
EXHIBITCPage i of27
This matter is before the Court on the parties' motions in limine. The
Court heard oral argument on these motions on June 10, 2009. Trial is set to
begin on June 15, 2009.
i. Defendant's Motion to Suppress Evidence (Docket No. 263)
Defendant Jammie Thomas-Rasset argues that the Court should exclude all
evidence gathered by MediaSentr because it operated in violation of state and
federal laws and because Plaintiffs' attorneys violated ethical rules through their
involvement with MediaSentr. Because the Court holds that MediaSentry has
not violated any of the asserted state or federal laws, it denies Defendant's
motion.
A. MediaSentry's Actions
Peer-to-peer networks allow Internet users to connect to each other and
transfer fies directly from user to user. (Jacobson Decl. ~ 2, PIs. Ex. A.) When
fies are distributed from one user to another user through a peer-to-peer
network, such as Kazaa, a set of identifying information ties the files back to the
user who distributed the fies. (Id. ~ 3.) This information includes the
distributor's IP address, the name of the fie, the size of the fie, the content hash,
2
EXHIBITCPage 2 of27
and the port information. (Id.) The user requesting the files communicates the
request that the sharing computer send the fies, and the sharing computer then
sends those requested fies. (Id. ~ 5; Connelly Decl. ~ 2, PIs. Ex. B.) Kazaa does
not allow one user to gain access into or to manipulate the contents of another
user's computer. Gacobson Decl. ~ 5.) It does allow a user to view the contents
of the files that other users placed in the shared folder. (Id.)
The Kazaa interface displays information about each file that is available
in other users' shared folders. MediaSentry recorded the image for each screen
displayed by Kazaa that lists the available fies. It also used Kazaa to download
selected files to its own machine to confirm that the files were copyrighted sound
recordings.
The IP address is transmitted as part of the normal process of connecting
one computer to another over the Internet. Gacobson Decl. ~ 6.) When
attempting to identify alleged infringers on peer-to-peer networks, MediaSentry
used the same Kazaa network protocols that every other user used to search for
and download fies on the network. (Connelly Decl. ~ 2.) Files were transferred
to MediaSentr by the uploader in the form of data packets, which contained
information identifying the source IP address. (Id.) Through packet capture
3
EXHIBITCPage 3 of27
technology, MediaSentry recorded the interaction between itself and the
computer connected to the file sharing network and distributing the material to
MediaSentry. (Id.; 1 Trial Tr. 185.) MediaSentry captured every packet
transferred, which included the IP address of the source of the packet. (1 Trial Tr.
187-88.)
B. The Minnesota Private Detectives Act
1. Whether MediaSentr Violated the Act
Defendant alleges that MediaSentry collected evidence against her in
violation of the Minnesota Private Detectives Act, Minn. Stat. § 326.32, et seq.
("MPDA"). The MPDA provides:
No person shall engage in the business of private detective orprotective agent, or advertise or indicate in any verbal statement orin written material that the person is so engaged or available tosupply those services, without having first obtained a license asprovided in sections 326.32 to 326.339.
Minn. Stat. § 326.3381, subd. 1. MediaSentry does not hold a private detective
license in Minnesota. (Def. Ex. A.).
Defendant argues that MediaSentry engaged in the business of being a
private detective under multiple provisions of the statute:
Persons who for a fee, reward, or other consideration, undertake any
4
EXHIBITCPage 4 of27
of the following acts for the purpose of obtaining information forothers are considered to be engaged in the business of a privatedetective:
* * *
(2) investigating the identity, habits, conduct, movements,whereabouts, transactions, reputation, or character of any person ororganization;
(3) investigating the credibilty of witnesses or other persons;
(4) investigating the location or recovery of lost or stolen property;(or)
* * *
(8) obtaining through investigation evidence to be used before anyauthorized investigating committee, board of award, board ofarbitration, administrative body, or officer or in preparation for trialof civil or criminal cases;
Minn. Stat. § 326.338, subd. 1. Defendant asserts that MediaSentry engaged in
each of the listed activities when it investigated the identity of the user of the
computer from which it downloaded the songs at issue in this lawsuit and when
it obtained evidence of the copyrighted songs on Defendant's computer.
Defendant also claims that MediaSentr violated the MPDA when it held itself
out to be a private detective; however, she has offered no admissible evidence of
such advertisement in Minnesota.
5
EXHIBITCPage 5 of27
Defendant notes that the alleged violations of the MPDA are crimes under
Minnesota law. See Minn. Stat. § 326.339.
The Court concludes that MediaSentry is not subject to the MPDA. Based
on the language of the MPDA, the Act does not apply to persons or companies
operating outside of the state of Minnesota. See Minn. Stat. § 326.3381, subd. 5
(providing procedures for licensing out-of-state applications for those who
"establish a Minnesota office"). Additionally, there is a general presumption that
Minnesota statutes do not apply extraterritorially. See In re Pratt, 18 N.W.2d 147,
153 (Minn. 1945), cited in Harrington v. Northwest Airlines, Inc., No. A03-192,
2003 WL 22016032, at *2 n.1 (Minn. Ct. App. Aug. 26, 2003) (unpublished) (noting
that Minnesota courts employ "the presumption against a state statute having
extraterritorial application").
MediaSentry does not operate within Minnesota. (Connelly Decl. ~ 3.) It
has no employees in Minnesota and does not conduct any activities in Minnesota.
(Id.) It pays no taxes in the state and has no agent for service of process here.
(Id.) MediaSentry conducted no activity in Minnesota relating to this case, and
all of the information it received was sent by Defendant from her computer to
MediaSentry's computer in a state other than Minnesota. (Id.) Merely
6
EXHIBITCPage 6 of27
monitoring incoming internet traffic sent from a computer in another state is
insufficient to constitute engaging in the business of private detective within the
state of Minnesota.
c. The Pen Register and Trap and Trace Devices Act
Defendant asserts that MediaSentry violated the Pen Register Act when it
recorded the packets that included the IP address of the sender. It is a crime
under 18 U.s.C § 3121 to "install or use a pen register or a trap and trace device,
without first obtaining a court order."
Under the statute both the term "pen register" and the term "trap and trace
device" are defined as devices or processes which capture certain information but
do not capture "the contents of any communication." 18 U.s.C § 3127(3), (4). See
also Columbia Pictures, Inc. v. Bunnell, 245 F.R.D. 443, 450 (CD. CaL. 2007)
("(P)en registers and trap and trace devices, by definition, do not record 'the
contents of any communication."') (citation omitted).
The Pen Register Act has no application here because the IP address
recorded by MediaSentry was parfof the content of the communication. The
metadata that is transmitted along with every file sent through the FastTrack
network used in this case always includes the IP address. (Jacobson Decl. ei 6.)
7
EXHIBIT CPage 7 of27
Furthermore, the Pen Register Act cannot be intended to prevent
individuals who receive electronic communications from recording the IP
information sent to them. If it did apply in those cases, then the Internet could
not fuction because standard computer operations require recording IP
addresses so parties can communicate with one another over the Internet.
(Jacobson Decl. en 4.)
Additionally, the Pen Register Act does not bar recordings of the contents
of communications that are made with the consent of one of the parties to the
communication. See, e.g., United States v. Milet, No. 05 CR 81, 2005 WL
3605269, at *1 (N.D. IlL. Nov. 3, 2005) (/I And recordings made of conversations
with the consent of one of the parties are permissible under federal law. The pen
registers and trap-and-trace devices may well assist the government in
determining the exact time and date of telephone calls and the telephones
accessed, but they do not disclose the contents of the conversations, nor do they
make ilegal the consensual recordings./I). In this case, the IP addresses were
communicated as part of the packets Defendant's computer sent to
MediaSentry's computer. MediaSentr, as a party to that communication, simply
recorded the information transmitted to it from Thomas-Rasset's computer.
8
EXHIBIT CPage 8 of27
D. The Electronic Communications Privacy Act of 1986
The Electronic Communications Privacy Act of 1986 prohibits
unauthorized wiretapping:
Except as otherwise specifically provided in this chapter any personwho-
(a) intentionally intercepts, endeavors to intercept, or procures anyother person to intercept or endeavor to intercept, any wire, oral, orelectronic communication;
* * *
shall be punished as provided in subsection (4) or shall be subject tosuit as provided in subsection (5).
18 U.sc. § 2511(1).
Defendant claims that MediaSentr violated § 2511(1) by intercepting
electronic communications in the form of the packets traveling between Thomas-
Rassets computer and MediaSentry's computer. Defendant also claims that
MediaSentry violated the statute when it recorded images of the Kazaa interface.
She asserts that the display screen Înterface of Kazaa constituted an electronic
communication from the sender to the MediaSentry operator, communicating
information about the files on the sender's computer.
Assuming, without deciding, that MediaSentry's actions constituted
9
EXHIBITCPage 9 of27
interception of an electronic communication, MediaSentry falls under the
participant exception to the Wiretap Act. Section 251l(2)(d) provides:
It shall not be unlawful under this chapter for a person not actingunder color of law to intercept a wire, oral, or electroniccommunication where such person is a party to the communicationor where one of the parties to the communication has given priorconsent to such interception unless such communication isintercepted for the purpose of committing any criminal or tortiousact in violation of the Constitution or laws of the United States or ofany State.
18 U.s.CA. § 251l(2)(d).
MediaSentry was clearly a party to the electronic communication with
Defendant. Defendant asserts that this exception does not protect MediaSentry
because MediaSentry was intercepting communications for the purpose of
committing the crime under Minnesota law of engaging in the business of a
private detective without a license,. committing the crime under federal law of
recording IP addresses in violation of the Pen Register Act, and committng the
Minnesota tort of intrusion upon seclusion.
MediaSentry did not intercept the communications for the purpose of
committing a crime or tort. As the Court has already held, MediaSentry did not
commit a crime under the MPDA or under the Pen Register Act. Although
10
EXHIBITCPage 10 of27
Defendant has vaguely alluded to private detective licensing laws from other
states, there is no evidence or legal argument before the Court upon which the
Court could conclude that MediaSentry was subject to and violated another
state's private detective law in this case. Even if, in capturing the information
sent from Defendant's computer, MediaSentr had incidenÚi.lly violated a private
detective licensing statute from some other state, gathering evidence of
Defendant's alleged copyright infringement cannot be said to have been
accomplished for the purpose of committing a tort or crime. See Meredith v.
Gavin, 446 F.2d 794,798 (8th Cir. 1971) (discussing legislative history of exception
to one-party consent exception to the Wiretap Act, which was aimed at
"monitoring. . . for insidious purposes such as blackmail, stealing business
secrets" and holding that exception applied when recorder's "purpose is evil").
The tort of intrusion upon seclusion occurs when one "intentionally
intrudes, physically or otherwise, upon the solitude or seclusion of another or his
private affairs or concerns. . . if the intrsion would be highly offensive to a
reasonable person." Lake v. Wal-Mart Stores, Inc., 582 N.W.2d 231,233 (Minn.
1998) (footnote omitted). Thomas-Rasset asserts that MediaSentry's actions
would be highly offensive to a reasonable person. The Court disagrees. There is
11
EXHIBIT CPage i i of27
no expectation of solitude or seclusion when a person activates a file sharing
program and sends a fie to the requesting computer. By participating in Kazaa,
a user expects milions of other users to view and copy her files, each time
receiving the very information that Thomas-Rasset sent to MediaSentry and
MediaSentry recorded.
E. Ethical Violations
Defendant asserts that the Court should suppress evidence gained by
MediaSentry because it was ilegally obtained at the direction and under the
supervision of Plaintiffs' lawyers in violation of their ethical obligations. The
Court has held that MediaSentry did not ilegally obtain the evidence in question.
MediaSentry acted for the legitimate purpose of discovering infringers and
protecting its clients' copyrights. Therefore, there was no ethical violation
committed by Plaintiffs' attorneys' involvement with MediaSentry's
investigation.
F. Conclusion
Because Defendant has failed to show that MediaSentry violated any law
in gathering the evidence to be used in this case, Defendant's motion to suppress
is denied.
12
EXHIBIT CPage 12 of27
II. Plaintiffs' Motion in Limine to Exclude the Testimony of Defendant's
Expert Dr. Yongdae Kim (Docket No. 272)
A. Daubert Standard
The admissibilty of expert testimony is governed by Federal Rule of
Evidence 702. The proponent of the testimony has the burden to show by a
preponderance of the evidence that the testimony is admissible under Rule 702.
Lauzon v. Sen co Prods., Inc., 270 F.3d 681, 686 (8th Cir. 2001). Under the Rule:
If scientific, technical, or other specialized knowledge wil assist thetrier of fact to understand the evidence or to determine a fact inissue, a witness qualified as an expert by knowledge, skil,experience, training, or education, may testify thereto in the form ofan opinion or otherwise, if (1) the testimony is based upon sufficientfacts or data, (2) the testimony is the product of reliable principlesand methods, and (3) the witness has applied the principles andmethods reliably to the facts of the case.
Fed. R. Evid. 702.
"Under the framework developed in Daubert, trial courts must serve as
gatekeepers to insure that proffered expert testimony is both relevant and
reliable. Trial courts are given broad discretion in fulfiling this gatekeeping role
. . .." Wagner v. Hesston Corp., 450 F.3d 756, 758 (8th Cir. 2006) (citations
omitted). The proposed testimony must be useful to the factfinder in deciding
the ultimate fact issue; the expert witness must be qualified; and the proposed
13
EXHIBITCPage 13 of27
evidence must be reliable. Lauzon, 270 F.3d at 686.
When considering the reliabilty and relevance of expert testimony, the
Court may examine "whether the theory or technique is subject to testing,
whether it has been tested, whether it has been subjected to peer review and
publication, whether there is a high known or potential rate of error associated
with it, and whether it is generally accepted within the relevant community."
Unrein v. Timesavers, Inc., 394 F.3d 1008, 1011 (8th Cir. 2005) (citation omitted).
The Court's inquiry is "flexible and fact specific." Id.
As a general rule, the factual basis of an expert opinion goes tothe credibilty of the testimony, not the admissibilty, and it is up tothe opposing party to examine the factual basis for the opinion incross-examination. Only if the expert's opinion is so fundamentallyunsupported that it can offer no assistance to the jury must suchtestimony be excluded.
Bonner v. ISP Techs., Inc., 259 F.3d924, 929-30 (8th Cir. 2001) (citation omitted).
B. Factual Basis for Kim's Opinion
Defendant's expert witness is Dr. Yongdae Kim, as Associate Professor in
the University of Minnesota Department of Computer Science. Kim wil not offer
an opinion regarding whether Thomas-Rasset infringed Plaintiffs' copyrights or
whether her com puter was used to distribute their copyrighted sound
14
EXHIBITCPage 14 of27
recordings. Instead, Kim wil offer possible explanations regarding how
someone other than Thomas-Rasset could have committed the fie sharing at
issue in this case. Plaintiffs argue that, although Kim lists fourteen possible
explanations in his report, he admits that there is no evidence to support any of
the explanations.
Defendant retorts that Kim wil only offer rebuttal testimony to assist the
jury in properly weighing the evidence regarding the origin of the Kazaa
software and the allegedly infringing songs on Defendant's computer.
Defendant admits that Kim wil not offer an opinion regarding the probable
cause of the presence of Kazaa and the songs on Thomas-Rasset's computer.
Instead, he is merely offering his testimony as a rebuttal to the testimony of
Plaintiffs' expert witness. Kim wil opine on the reliabilty and weight of
Plaintiffs' expert's testimony. Kim.wil also discuss possible alternative
explanations that Plaintiffs' expert did not consider in arriving at his conclusions.
Defendant asserts that testimony regarding possibilties, even if they are not
probable, is legally sufficient if the proposed expert is attempting to rebut the
testimony of another expert. Defendant also argues that she does not bear the
burden of proof on the question of causation, so her expert does not need to
15
EXHIBIT CPage 15 of27
testify regarding probable causation, but can simply offer alternative
explanations to attack Plaintiffs' theory of causation.
As a defense rebuttal witness, Kim does not have to testify that the other
possible explanations were the probable cause that Kazaa and the sound
recordings at issue appeared to be on Defendant's computer. See, e.g., Allen v.
Brown Clinic, P.L.L.P., 531 F.3d 568, 574-75 (8th Cir. 2008) (holding that defense
expert could testify as to other possible, but not necessarily probable, causes of
plaintiff's injury, because, to require more would "unduly tie a defendant's
hands in rebutting a plaintiff's case, where as here, plaintiff's expert testifies that
no other cause could have caused plaintiff's injury," and would "impermissibly
shift the burden of proof and require a defendant to 'disprove' a plaintiff's theory
by a preponderance of the evidence") (citation omitted). Because Kim is offered
only as a rebuttal expert, and only opines regarding possibilties in his report, his
testimony must be limited such that "remarks are made in rebuttal of Plaintiff's
expert and are not done to establish a cause." Morrison v. Stephenson, No.
2:06-CV-283, 2008 WL 618778, at *4 (S.D. Ohio Mar. 3, 2008).
Therefore, Kim can testify regarding the possible scenarios that can occur
on a peer-to-peer network that would result in the incorrect user being identified
16
EXHIBITCPage 16 of27
by MediaSentry. Kim cannot opine regarding causation or what he thinks
probably occurred in this case.
Plaintiffs note fourteen particular instances of Kim's testimony that they
allege are unsupported and objectionable. Because Kim's testimony is limited to
rebuttal and he is not permitted to testify as to causation, the Court rejects most
of Plaintiffs' arguments regarding admissibilty. The alleged lack of factual basis
for many of Kim's opinions goes to cred.ibilty and provides ground for cross
examination. However, the Court does hold that Kim cannot testify based purely
on speculation or when, beyond lacking evidence to support his theory, the
record only contains evidence that makes his theory impossible, and, thus,
unhelpful to the jury. See Marmo v. Tyson Fresh Meats, Inc., 457 F.3d 748, 757
(8th Cir. 2006) ("Expert testimony is inadmissible if it is speculative, unsupported
by sufficient facts, or contrary to the facts of the case.") (citation omitted).
Therefore, given the evidence that there is no wireless router involved in
this case, the Court excludes Kim's opinion that it is possible that someone could
have spoofed or hijacked Defendant's Internet account through an unprotected
wireless access point. Similarly, because Kim explicitly testified that this case
does not involve any "black IP space," or any "temporarily unused" IP space
17
EXHIBIT CPage 17 of27
(Kim Dep. 110-11), he is not permitted to opine at trial that hijacking of black IP
space or temporary unused IP is a possible explanation in this case.
In § 3.4 of his Report, Kim asserts that there is no evidence that the music
fies were "consciously placed" in the shared directory on Thomas-Rassets
computer or were wilfully offered for distribution. Kim testified that he is not an
expert in human behavior and that his opinion is based on nothing but
"speculation." (Kim Dep. 127-28.) Although the Court grants Kim leeway to
testify regarding possibilties, speculative testimony is stil inadmissible. Because
Kim admits that his opinion on this point is speculative, it is excluded.
In § 4.4 of Kim's report, he opines, "The KaZaA-reported IP address is not
evidence that the machine running KaZaA is not behind a NAT device."
However, Kim testified that he has. no knowledge to support this opinion. (Kim
Dep.141-43.) He admits that he did obtain a functioning version of Kazaa and
could have run it to observe its behavior, but chose not to. (Kim Dep. 144-45.)
Kim admittedly has no knowledge to support his opinion regarding Kazaa's
functioning and has not, in fact, observed Kazaa functioning - although he had
the opportunity to do so. His opinion regarding Kazaa's functioning in this
instance is excluded as not based on a reliable scientific method.
18
EXHIBITCPage 18 of27
As to Kim's other opinions, the Court concludes that their alleged lack of
foundation or improper factual basis goes to weight not admissibilty.
C. Kim's Expertise
Plaintiffs argue that, while Kim is qualified in computer science, he has no
experience with the Kazaa or Kazaa Lite file sharing programs or with the
FastTrack fie sharing network. His only experience with Kazaa was his attempt
to download the program and examine the interface in connection with this case.
He did not attempt to run the program or observe its behavior. Plaintiffs
conclude that, therefore, Kim is not qualified to testify on Kazaa, Kazaa Lite, or
FastTrack. Plaintiffs also argue that Kim is unqualified to opine regarding his
examination of a forensic copy of Defendant's computer because of his lack of
experience in computer forensics.
Defendant responds that Kim has conducted research and is an expert in
peer-to-peer systems and network security. Kim's education and background in
computer science qualify him as an expert in general computer science.
Defendant admits that Kim has little experience with FastTrack, Kazaa, or Kazaa
Lite, but argues that this is a universal problem because there have been few
studies done of these programs in the academic community, particularly because
19
EXHIBIT CPage 19 of27
Kazaa is proprietary. Defendant argues that, somehow, Plaintiffs have a
monopoly on Kazaa experts.
Kim is qualified in the general areas of computer science, peer-to-peer
networks, and computer security. He is not specifically an expert in Kazaa,
Kazaa Lite, or FastTrack. Here, Plaintiffs do not control Kazaa, FastTrack, or
Kazaa Lite. In fact, Kim had a functioning copy of Kazaa, but chose not to test it.
There is no institutional barrier to a computer science expert becoming expert in
Kazaa without working with Plaintiffs.
Despite this fact, the Court holds that Kim is qualified to testify in this case.
He is an expert in the general fields of peer-to-peer networks and computer
security. Although he has not tested Kazaa, Kazaa Lite, or FastTrack firsthand,
he has gained knowledge of these areas through his review of other academic
studies, informed by his general expertise in peer-to-peer networks. Kim's
failure to test of Kazaa, FastTrack, or Kazaa Lite goes to the weight and
credibilty of his opinions and wil be grounds for cross examination.
D. Application of Rule 403
Plaintiffs also claim that Kim's testimony should be excluded under
Federal Rule of Evidence 403.
20
EXHIBIT CPage 20 of27
1. Rule 403 Standard
Federal Rule of Evidence 403 provides:
Although relevant, evidence may be excluded if its probative valueis substantially outweighed by the danger of unfair prejudice,confusion of the issues, or misleading the jury, or by considerationsof undue delay, waste of time, or needless presentation ofcumulative evidence.
"Because '(e)xpert evidence can be both powerful and quite misleading,' a
trial court must take special care to weigh the risk of unfair prejudice against the
probative value of the evidence under Fed. R. Evid. 403." Nichols v. Am. Natl
Ins. Co., 154 F.3d 875, 884 (8th Cir. 1998) (quoting Daubert v. Merrell Dow
Pharm., 509 U.s. 579, 595 (1993)).
2. Application to Kim's Proposed Testimony
Plaintiffs argue that Kim's testimony has almost no value because he has
no experience or training with Kazaa or the FastTrack network and because his
opinions rely on speculative assumptions. They conclude that the probative
value of his testimony is outweighed by the dangers of unfair prejudice to
Plaintiffs, of confusing the issues, and of misleading the jury.
The Court has restricted Kim's testimony to exclude opinions on causation,
opinions based on speculation, and opinions based on facts completely
21
EXHIBIT CPage 21 of27
contradicted by the record. The basis for his remaining opinions can be tested
through cross examination. Having weighed the probative value of Kim's
testimony as rebuttal against the dangers enumerated in Rule 403, the Court
concludes that Rule 403 does not justify additional exclusion.
III. Defendant's Unopposed Motion in Limine (Docket No. 276)
As the Court orally ruled during the June 10 hearing, the parties shall refer
to the previous trial as II a prior proceeding." The results of that trial shall not be
revealed to the jury.
iv. Plaintiffs' Motion in Limine to Preclude Defendant from Raising or
Asserting Evidence of Other Lawsuits (Docket No. 279)
Plaintiffs ask that the Court bar Defendant from introducing evidence
regarding other copyright lawsuits involving Plaintiffs. As the Court explained
during June 10 hearing, it wil reserve ruling on this motion because the type of
evidence that Defendant wil be permitted to offer wil depend upon the evidence
and arguments offered by Plaintiffs. All parties are warned to abide by the Rules
of Evidence and Civil Procedure during triaL.
v. Plaintiffs' Motion in Limine to Preclude Fair Use Defense (Docket No.
283)
Plaintiffs ask that Defendant be barred from asserting the fair use defense
22
EXHIBITCPage 22 of27
because she failed to assert this affrmative defense until two weeks before trial
and has waived the defense.
Fair use is an affirmative defense. Campbell v. Acuff-Rose Music, Inc., 510
u.s. 569,590 (1994) ("Since fair use is an affirmative defense, its proponent would
have difficulty carrying the burden of demonstrating fair use without favorable
evidence about relevant markets.") (footnotes omitted); Harper & Row Publ'rs,
Inc. v. Nation Enters., 471 U.S. 539, 561 (1985) ("The drafters resisted pressures
from special interest groups to create presumptive categories of fair use, but
structured the provision as an affirmative defense requiring a case-by-case
analysis.") (citations omitted).
Defendant's reliance upon Sony Corp. of America v. Universal City
Studios, Inc., is misplaced. 464 U.s. 417 (1984). In Sony, the Supreme Court did
not hold that fair use is no longer an affirmative defense in non-commercial
cases. Moreover, both Campbell and Harper & Row were decided after - and
both cited to - Sony and both explicitly provided that fair use is an affirmative
defense. The Supreme Court has explicitly rejected any fair use presumption
based on commercial or non-commercial use. See CampbelL, 510 U.s. at 584
(discussing Sony and holding: "The language of the statute makes clear that the
23
EXHIBITCPage 23 of27
commercial or nonprofit educational purpose of a work is only one element of
the first factor enquiry into its purpose and character. ... As we explained in
Harper & Row, Congress resisted attempts to narrow the ambit of this traditional
enquiry by adopting categories of presumptively fair use, and it urged courts to
preserve the breadth of their traditionally ample view of the universe of relevant
evidence.") (citations omitted).
"Generally, failure to plead an affirmative defense results in a waiver of
that defense." First Union Natl Bank v. Pictet Overseas Trust Corp., Ltd., 477
F.3d 616, 622 (8th Cir. 2007) (citations omitted). However, "(w)hen an affirmative
defense is raised in the trial court in a manner that does not result in unfair
surprise, . . . technical failure to comply with Rule 8(c) is not fataL'" Id. (citation
omitted).
In this case, the Court holds that Defendant has waived the affirmative
defense of fair use. Defendant failed to raise the fair use defense in her Answer,
at any time before the First Trial, during the First Trial, or at any time leading up
to this retrial until only two weeks before retriaL. This litigation has gone on for
years, yet Plaintiffs had no inkling of this defense until the eve of triaL. Because
Plaintiffs had no notice of this defense, they have taken no discovery regarding
24
EXHIBITCPage 24 of27
Defendant's alleged fair use defense. The record in this case, with which this
Court is intimately familar, gave no hint that a fair use defense would be
forthcoming. It would be highly prejudicial to Plaintiffs to allow Defendant to
assert this new affirmative defense on the eve of retrial, when they have no
opportunity to conduct discovery on this issue and long ago missed the
opportunity to fie a dispositive motion regarding this affirmative defense. The
Court holds that Defendant has waived the fair use defense. Plaintiffs' motion is
granted.
VI. Plaintiffs' Motion in Limine to Preclude Defendant from Asserting an
Innocent Infringement Defense at Trial (Docket No. 284)
Plaintiffs ask the Court to hold that Defendant cannot seek a reduction in
statutory damages under 17 U.S.C. § 504, known as the innocent infringement
defense. They claim that Thomas-Rasset has waived this defense by not asserting
it until two weeks before trial and, in the alternative, the defense is barred
because Plaintiffs placed proper copyright notices on published copies of their
copyrighted works to which Thomas-Rasset had access.
At the June 10 hearing, Defendant informed the Court that she does not
oppose Plaintiffs' motion. Therefore, Plaintiffs' motion is granted.
25
EXHIBITCPage 25 of27
VII. Defendant's Motion to Dismiss for Lack of Subject Matter Jurisdiction(Docket No. 310)
As the Court orally ruled during the June 10 hearing, Defendant's Motion
to Dismiss for Lack of Subject Matter Jurisdiction is denied at this time because
the motion is premature.
Accordingly, based upon the fies, records, and proceedings herein, IT is
HEREBY ORDERED:
1. Defendant's Motion to Suppress Evidence (Docket No. 263) is
DENIED.
2. Plaintiffs' Motion in Limine to Exclude the Testimony of Defendant's
Expert Dr. Yongdae Kim (Docket No. 272) is GRANTED IN PARTand DENIED IN PART as set forth in this Order.
3. Defendant's Unopposed Motion in Limine (Docket No. 276) is
GRANTED as set forth in this Order.
4. Plaintiffs' Motion in Limine to Preclude Defendant from Raising or
Asserting Evidence of Other Lawsuits (Docket No. 279) isRESERVED.
5. Plaintiffs' Motion in Limine to Preclude Fair Use Defense (Docket
No. 283) is GRANTED.
6. Plaintiffs' Motion in Limine to Preclude Defendant from Asserting
an Innocent Infringement Defense at Trial (Docket No. 284) isGRANTED.
26
EXHIBITCPage 26 of27
7. Defendant's Motion to Dismiss for Lack of Subject Matter
Jurisdiction (Docket No. 310) is DENIED WITHOUT PREJUDICEas premature.
Dated: June 11, 2009 s/Michael J. DavisMichael J. DavisChief JudgeUnited States District Court
27
EXHIBITCPage 27 of27
Kenneth R. Davis, II, OSB No. [email protected] T. Patton, OSB No. 97364 R£CJD'OJ SEP 1416:21usri,oRF'
[email protected] POWELL SPEARS LUBERSKY LLP601 S.W. Second Avenue, Suite 2100Portland, OR 97204Phone: (503) 778-2100Fax: (503) 778-2200
Attorneys for Plaintiffs .SONY MUSiC ENTERTAINMENT INC.; UMGRECORDINGS, INC.; WARR BROS.RECORDS INC.; and BMG MUSiC
UNITED STATES DISTRICT COURT
DisTRcT OF OREGON
SONY MUSiC ENTERTAIMENT INC., aDelaware torporation; UMGRECORDINGS, INC., a DelawaretorporatioD; WARNER BROS. RECORDSINC., a Delaware torporation; and BMGMUSIC, a New York general partnership,
No. 04-1089 BR
df(PR OPßS~gJ JUDGMENT ANDPERMNENT INJUCTION BASED ONSTIPULATION
Plaintiffs,
v.
TOM BURGUS,
Defendant.
The Cour, having considered the Stipulation to Judgment and Permanent Injunction
executed by the paries,
PAGE 1 - (PR@~D) JUDGMENT AND PERMNENT INJUNCTION
LAE PoWELL SPI:S LUBERSKY LLPSlßTE 2100
601 SW SECOND AVENUEPORTLAND, OREGON 972043 i 58
(503) 77112100EXHIBITDPage 10f4
RECORDOOO 1923 i
IT IS ORDERED AND ADJUGED THAT:
1. Plaintiffs have alleged that Defendant Thomas Burgess (erroneously sued herein
as "Tom Burgus") ("Defendant") distributed (including by uploading) and/or reproduced
(including by downloading) via the Internet or an online media distribution system copyrghted
sound recordings owned or controlled by the Plaintiffs, without Plaintiffs' authorization, in
violation of 17 U.S.C. § 501. Without admitting or denying liabilty, Defendant has not
contested plaintiffs' allegations, and has acknowledged that such conduct is wrongfuL.
2. Defendant shall pay to Plaintiffs in settlement of this action the sum of$2,850.00.
3. Defendant shall pay Plaintiffs' costs of suit (complaint fiing fee and service of
process fee) in the amount ofSI50.00.
4. Defendat shall be and hereby is enjoined from directly or indirectly infnging
Plaintiffs' rights under federal or state law in any sound recording, whether now in existence or
later created, that is owned or controlled by Plaintiffs (or any parent, subsidiar, or affliate
record label of Plaintiffs) ("Plaintiffs' Recordings"), including without limitation by:
a) using the Internet or any online media distribution system to reproduce (i.e.,
download) any ofPlaintitT' Recordings, to distribute (i.e., upload) any of
Plaintiffs' Recordings, or to make any of Plaintiffs' Recordings available for
distribution to the public, except pursuat to a lawfl license or with the express
authority of Plaintiffs; or
PAGE 2 - (P..P9ßDJ JUGMENT AND PERMNENT INJUCTION
L"NE POWELL SPEARS LVDERSKY LLPSUlTE2100
601 SW SECOND "VENUEPORTIAND, OREGON 97204.3158
(503)771.2100EXHIBITDPage 2 of4
RECORDOOO 19232
b) causing, authorizing, permitting, or faciltating any third par to access the
Internet or any online media distrbution system though the use of an Internet
connection and/or computer equipment owned or controlled by Defendant, to
reproduce (i.e., download) any of Plaintiffs' Recordings, to distrbute (i.e., upload)
any of Plaintiffs' Recordings, or to make any of Plaintiffs' Recordings available
for distrbution to the public, except pursuant to a lawfl license or with the
express authority of Plaintiffs.
Defendant also shall destroy all copies of Plaintiffs' Recordings that Defendant and/or any third
par that has used the Internet connection and/or computer equipment owned or controlled by
Defendant has downloaded without Plaintiffs' authorization onto any computer hard drve or
server owned or controlled by Defendant, and shall destroy all copies of those downoaded
recordings transferred onto any physical medium or device in Defendant's possession, custody,
or control.
5. Defendant irrevocably and fully waives notice of entr of the Judgment and
Permanent Injunction, and understands and agrees that violation of the Judgment and Permanent
Injunction will expose Defendant to all penalties provided by law, including for contempt of
Cour.
6. Defendant irrevocably and fully waives any and all right to appeal this Judgment
and Permanent Injunction, to have it vacated or set aside, to seek or obtain a new trial thereon, or
otherwse to attack in any way, directly or collaterally, its validity or enforceabilty.
7. Nothing contained in the Judgment and Permanent Injunction shall limit the right
of Plaintiffs to recover damages for any and all infringements by Defendant of any right under
PAGE 3 - (PR:QPElSEDj JUDGMENT AND PERMANENT INJUNCTION
LAE POWELL SPEA LUBEISKY LLPSUITE 2100
601 SW SECOND AVENUPORnAND. OREGON 972043 i 58
(SOL) 778-2100EXHIBITDPage 3 of4
RECORDOOO i 9233
federal copyright law or state law occurng after the date Defendant executes the Stipulation to
Judgment and Permanent Injunction.
8. Defendant shall not make any public statements that are inconsistent with any
term of the Stipulation to Judgment and Permanent Injunction.
9. The Court shall maintain continuing jurisdiction over this action for the purose
of enforcing this final Judgment and Permanent Injunction.
DATED: /5-~umtfBy: ~~u0
Hon. Ana J. BrownUnited States District Judge
PAGE 4 - (P~l JUDGMENT AND PERMANENT INJUNCTION
LANE POWELL SI'EARS LVBERSKY LLPSUITE 2100
601 SW SECOND AVENUPORTL. OREGON 97204.)158
(Sal) 771-2100
EXHIBITDPage 4 of4
RECORDOOO 19234
Case 4:05-cv-00328-RAS Document 34 Filed 10/27/2006 Page 1 of 3
IN THE UNITED STATES DISTRICT COURTFOR THE EASTERN DISTRICT OF TEXAS
SHERMAN DIVISION
Plaintiffs,
§
§
§
§
§
§
§
§
§
§
Case No. 4:05-CV -328
SONY BMG MUSIC ENTERTAINMENT,et al.
v.
KIMBERLY ARELLANES,
Defendant.
ORDER GRATING IN PART PLAINTIFFS' MOTION TO COMPEL DISCOVERY
Before the cour is the "Plaintiffs' Motion to Compel Discovery and Brief in Support" (de
#19) fied August 7, 2006, along with the Defendant's response, the Plaintiffs' reply and the
Defendant's surreply. Having considered the motion and responsive fiings, the court is of the
opinion that the motion should be GRANTED IN PART.
In this lawsuit, the Plaintiffs seek damages and injunctive relief from the Defendant for
copyright infringement. The Plaintiffs allege that the Defendant, using her personal computer,
downloaded and distributed copyrighted sound recordings. Pursuant to Rules 34(a) and 37 of the
Federal Rules of Civil Procedure, the Plaintiffs seek a court order requiring the Defendant to produce
her computer for copying and inspection of its hard drive in order to determine whether or not indeed
the computer was used to download and distribute copyrghted sound recordings. Rule 34(a)
provides for the inspection and copying of tangible things, which would include computer hard
drives containing matters within the scope of Rule 26(b). The court agrees with the Plaintiffs that
the contents of the hard drive of the computer used by the Defendant during the time period at issue
-1-
EXHIBITEPage 1 of3
Case 4:05-cv-00328-RAS Document 34 Filed 10/27/2006 Page 2 of 3
in this case are relevant.
The Plaintiffs seek permission for their forensic computer expert to make a mirror image of
the Defendant's hard drive and then to analyze it for evidence that copyrighted material was
downloaded and distributed. The Plaintiffs also want their expert to determine whether relevant
music fies have been deleted or electronically concealed and then to attempt to recover remnants
of those fies as evidence of infringement. The Plaintiffs point out that mirror-imaging the entire
hard drive is necessary and not over-broad because relevant information may be placed anywhere
on Defendant's hard drive by the computer operating system. The Plaintiffs argue that the
Defendant's privacy objections can be accomodated through a protective order under Rule 26( c).
The Defendant, citing invasion of privacy concerns, opposes the inspection of her computer
hard drive by anyone other than a neutral third part expert. She contends that her computer contains
personal information, such as personal correspondence, household financial matters, school
homework, and perhaps attorney-client privileged information, which would be compromised by
allowing the Plaintiffs' expert to mirror-image the entire hard drve. She suggests that the parties
select and the cour appoint a neutral computer forensics expert to perform the inspection and
copying of her computer hard drive in order to preserve her privacy on matters unconnected to the
issues in this lawsuit. In order to balance the legitimate interests of both sides, the court is of the
opinion that the Defendant's suggestion has merit.
It is therefore ORDERED that the Plaintiffs' Motion to Compel Discovery is GRANTED IN
PART in that the parties are instrcted to confer and to submit to the cour within 10 days of the date
of the entry of this order the name of an agreed upon neutral computer forensics expert who wil
mirror-image and inspect the Defendant's computer hard drive for evidence of copyright
-2-
EXHIBITEPage 2 of3
Case 4:05-cv-00328-RAS Document 34 Filed 10/27/2006 Page 3 of 3
infringement. The parties shall also confer in an effort to reach agreement on a protective order that
wil assure the protection of the Defendant's privacy and the confidentiality of privileged and
irrelevant, non-discoverable matter. The parties shall submit the proposed protective order to the
court within 10 days ofthe date ofthe entr ofthis order. The cost ofthe neutral computer forensics
expert wil be borne by the Plaintiffs; however, the Plaintiffs shall have the right to suggest hard
drive search methodologies to the neutrai expert and the expert shall make every effort to utilize
those methodologies. At the conclusion ofthe hard drve inspection, the neutral computer forensics
expert shall produce a report of his or her findings and the methodologies utilized to the parties and
the court.
IT is SO ORDERED.
SIGNED this the 27th day of October, 2006.
R;M g. -Jl¡RICHAR A. SCHELLUNITED STATES DISTRICT JUGE
-3-
EXHIBITEPage 3 of3
FAX FROM: Noticing - USDC-WDTX TO: 917132279508 PAGE: 1 OF 4 CONTROL: l1273350-TXWD
UNITED STATES DISTRICT COURT
WESTERN DISTRICT OF TEXASSAN ANTONIO DIVISION
WWW.tx wd.uscoLl rts.go~
NOTICE OF ORDERS OR JUGMENTSJ;'ed. R. Civ. P. 77(d)
Date: 01/26/06
To: Kristi Belt600 Travis streetSuite 1600Houston, TX 77002
Re: Case Number: 5: 05-cv-00372 Instrument Number: 22
If this facsimile cannot be delivered as addressed, please carl (210) 472-6550.
If this transmission is incomplete, our system wil attempt to resend it up to sixtimes.
Number of pages including cover sheet: 4
EXHIBITFPage i of 4
e eFILED
UNITED STATES DISTRICT COURTWF~TERN DISTRICT OF TEXAS
SAN ANTONIO DMSION
ARISTA RECORDS, L.L.c.; UMGRECORDINGS, INC.; BMG MUSIC;INRSCOPE RECORDS; ELEKTRENTERTAINMENT GROUP, INC.;SONY BMG MUSICENTRTAINMENT; andWARNR BROS. RECORDS, INC.,
Plaintit
VS.
DELINA TSCHIRHART,
Defendant.
JAN 2 5 2006
CLERK, U.S. DISTRICT COURTWESTERN 01 RfCT OF TEXASBY
§
§
§
§
§
§
§
§
§
§
§
§
§
§
§
Case No. SA05CA0372OG
ORDER RE: INSPECTION ANCOPYNG OF COMPUTR HA DRI
The Court hereby grants Plaitiffs' Motion to Compel and enters an Order
pursuant. to Federal Rule of Civil Procedure 26(c) for the protection of confidential
inormaton. IT is THEREORE ORDERED:
Delina Tschirhar ("Defendant") wil make her computer hard drve
available for imaging by Plaintiffs on or before i ice~ ks ~th,. t4 date lfif l)td~r 1$ _IstJl/ .On behalf of Arista Records, L.L.C, UMG Recordings, Inc., BMG Music,
Interscope Records, Elektra Entertainment Group. Inc., SONY BMO MUSIC
ENTERTAIMET, and Warer Bros. Record. Inc. ("'Plaintiffs"), an expert in
computer forensics wil make one (1) verified bit-image (i.e., mirror image copy) of the
computer hard drive and wil create an MD5 or equivalent hash code of Defendant's
original computer hard drive to ensure that Defendant's original hard drve is not altered
201989v2
ii/ EXHIBITFPage 2 of4
e eand to ensure that the copy of Defendant's hard drive that is inspected is an ex.act
duplicate of Defendant's original hard drive.
An expert in computer forensics wil then examne the image of the
Defendant's computer hard drive for all relevant data. At Defendant's request, one copy
of the mirror image and hash code signature wil also be provided to Defendant's
counsel. Defendant wil bear the cost of obtaining the copy of the mirror image and hash
code signature.
Plaintifs' expert in computer forensics (and any assistants puruant to the
following paragraph) wil keep confdential all non-relevant information regarding
Defendant's computer hard drve and wil disclose such information only to counsel for~l'~ri'rfJll1intifÁ or to the Court, as appropriate.
Plaintiffs' computer forensic expert may designate assistats to help in
efforts necessary to complete the forensic inspection of Defendants' computer hard drive.
After final resolution of this case, including all appeals, Plaitiffs' forensic
computer expert shall destroy all images of Defendant's computer hard drive and shall
confrm such destruction to the satisfaction of both paries.
Defendant wil prepare a privilege log for any and all files for which
Defendant clais a privilege. The pares agree that such mes are subject to in camera
review by the Court.
Plaintiffs wil timely notify Defendat's counsel of and produce hard
copies of any and all fies or documents that Plaintiffs may seek to introduce as evidence
at the trial of this action so that Defendant's counsel can timely raise any objection,
including privilege, to any such evidence or any portion thereof.
'P/A¡".fltN' -upeff, h /1 6( he,. dt.fljn~+ed LSr/,f-!f¡ And J'11J/~'¡tl. l~un~(tA,,1i m+- æeceSS or e-)(L~itie. ""' file.s lÙ.llfh~l~d '" l-h.. pru"'/rye ¡Pf /11110;
P-rAe,rWJse ()rlt-red b", th Courl.201989..2 iEXHIBIT FPage 3 of4
Page 1 of2
Anne Allen
From: ece [email protected]
Sent: Wednesday, January 16, 200810:23 AM
Subject: Activity in Case 1 :05-cv-01095-DGT-RML UMG Recordings, Inc. et al v. Lindor Discovery Hearing
This is an automatic e-mail message generated by the CM/ECF system. Please DO NOT
RESPOND to this e-mail because the mail box is unattended.***NOTE TO PUBLIC ACCESS USERS*** Judicial Conference of
the United States policypermits attorneys of record and parties in a case (including pro se litigants) to receive one freeelectronic copy of all documents fied electronically, if receipt is required by law or directed by thefier. PACER access fees apply to all other users. To avoid later charges, download a copy of eachdocument during this first viewing.
U.S. District Court
Eastern District of New York
Notice of Electronic Filng
The following transaction was entered on 11 16/2008 at 12 :22 PM EST and fied on 11 16/2008Case Name: UMG Recordings, Inc. et al v. LindorCase Number: i :05-cv- i 095Filer:Document Number: No document attached
Docket Text:Minute Entry for proceedings held before Magistrate Judge Robert M. Levy: RichardGabriel, Matt Oppenheim; Ray Beckerman, defendant; Richard Altman, nonparty WoodyRaymond. (1) Plaintiffs' motion to compel granted. Defendant and/or nonparty WoodyRaymond shall produce any Western Digital 100 GB external hard drive connected todefendant's computer on or before 7/8/04. (2) Discovery deadlines set as follows: closeof fact discovery: 4/30/08; expert disclosure: plaintiffs May 31,2008; defendant 6/30/08;close of expert discovery 7/31/08. (4) Woody Raymond's request to deem his depositionwaived due to what he believes was undue delay in taking the deposition, is denied, as(a) it was not unreasonable for plaintiffs to wait until all issues before Judge Tragerinvolving Woody Raymond were decided; (b) the court is not persuaded that Mr.Raymond has been prejudiced by any delay; and (c) Dr. Jacobson's report raisesrelevant issues relating to Mr. Raymond that will require his testimony. (5) Defendantand Woody Raymond have the right to depose Dr. Jacobson prior to the close of expertdiscovery. Defendant's request that plaintiffs bear the cost of that deposition is denied.While it is true that when defendant deposed Dr. Jacobson, the preliminary draft of hisexpert report did not mention an external hard drive, defendant chose to depose Dr.Jacobson before he made his expert disclosure or served his final expert report.Accordingly, defendant assumed the risk in taking this preliminary deposition, thatfurther depositions might be needed. The court does not have the authority to requireplaintiffs to fund that risk--nor would it be fair to do so. Next conference 7/31/08 at
111612008EXHIBITGPage i of2
Page 2 of2
11 :00. Discovery Hearing held on 1/16/2008 (Levy, Robert)
1:05-cv-l095 Notice has been electronically mailed to:
Morlan Ty R9gers [email protected]
Richard A. Altman [email protected], [email protected]
Brian Eugene Moran [email protected]
Ray Beckerman [email protected]
Lisa Jean Borodkin [email protected]
Richard L. Gabriel [email protected], [email protected]
Victor Bruce Kao [email protected]
1:05-cv-l095 Notice wil not be electronically mailed to:
Richard J. GuidaRobinson & Cole LLP885 Third AvenueSuite 2800New York, NY 10022
Marie C. Lindorclo Woody A. Raymond817 East 21 th StreetBrooklyn, NY 11210
1/16/2008EXHIBITGPage 2 of2
UNITED STATES DISTRICT COURTDISTRICT OF MINNESOTA
CAPITOL RECORDS INC.,a Delaware corporation;SONY BMG MUSIC ENTERTAINMENT,a Delaware general partnership;ARISTA RECORDS LLC,a Delaware limited liabilty company;INTERS COPE RECORDS,a California general partnership;WARNER BROS. RECORDS INC.,a Delaware corporation; andUMG RECORDINGS, INC.,a Delaware corporation;
Plaintiffs,
v. JUDGMENT IN A CIVIL CASECivil File No. 06-1497 (MJD/RLE)
JAMMIE THOMAS-RASSET,
Defendant.
This action came before the Court for a trial by jury. The issues have been
tried and the jury has rendered its verdict.
IT IS ORDERED AND ADJUDGED THAT:
Judgment is entered in favor of Plaintiffs and against Defendant as follows:
1
EXHIBIT HPage I of2
1. Capitol Records, Inc. - $80,000 for the 1 sound recording
2. Sony BMG Music Entertainment - $80,000 for each of the 6 soundrecordings
3. Arista Records LLC - $80,000 for each of the 2 sound recordings
4. Interscope Records - $80,000 for each of the 3 sound recordings
5. Warner Bros. Records Inc. - $80,000 for each of the 3 soundrecordings
6. UMG Recordings, Inc. - $80,000 for each of the 9 sound recordings
Dated: June 19, 2009 sl Michael I. DavisMichael J. DavisChief JudgeUnited States District Court
2
EXHIBIT HPage 2 of2
10
11
12
13
14
is
16
17
18
19
202 i
22
23
24
25
1
2
3
4
UNITED STATES DISTRICT COURTDI STRICT OF OREGON
Page i
5TANYA ANDERSEN , individually )and on behalf of all others )similarly situated, )
)Plaintiff, ))
vs. ) No. CV 07-934 BR)
ATLANTIC RECORDING CORPORATION,)a Delaware corporation; )PRIORITY RECORDS, LLC, a )California limi ted liability )company; CAPITOL RECORDS, INC.,)a Delaware corporation; UMG )RECORDINGS, INC., a Delaware )corporation; and BMG MUSIC, a )New York general partnership; )RECORDING INDUSTRY ASSOCIATION )OF AMERICA; SAFENET, INC., )f/k/a MEDIA SENTRY, INC., a )Delaware corporation; )SETTLEMENT SUPPORT CENTER, LLC,)a Washington limited liability )company, )
)
Defendants. )------------------------------- )
6
7
8
9
CONFIDENTIALDEPOSITION OF CHRISTOPHER CONNELLY
New York, New YorkThursday, May 28, 2009
Reported by:FRANCIS X. FREDERICK, CSR, RPR, RMRJOB NO. 23079
TSG Reporting - Worldwide (877) 702-9580
EXHIBIT IPage i of9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
1 PROCEEDINGS. - CONFIDENTIAL
Page 5
2 (Connelly Exhibi t 5, Declaration
of Christopher Connelly, marked for
identification as of this date.)
3
4
5 CHRISTOPHER CON N ELL Y,6 called as a wi tness, having been duly
sworn by a Notary Public, was examined
and testified as follows:
7
8
9 EXAMINATION BY
MR. LYBECK:
Q. Good afternoon, Mr. Connelly. My
name is Lory Lybeck. I introduced myself toyou earlier.
A. Urn-hum.
Q. I'm taking your deposition today
in a case of Tanya Andersen as an individualand on behalf of others similarly situated
because a declaration you signed has been
submi tted in support of a motion in this case.
You understand that i s what lIm
doing here today?
A. Yes.
Q. You i re represented by counsel
today. That's Mr. Mullaney.
A. That's correct.
TSG Reporting - Worldwide (877) 702-9580
EXHIBIT IPage 2 of9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
1 CONNELLY - CONFIDENTIAL
2 layman's terms.Is it simply a matter of giving
the KaZaA network the same commands one could
3
4
5 type in with one's fingers?
6 That's correct. It automates theA.
7 application just as if the normal user does it
and the automation was simply developed just
so that people wouldn't have to do it all day
long.
8
9
Q. Okay. Now, you run a query for --let's just say a popular song; is that
correct?A. Yes.
Q. And if it's a popular song there
how many responses might there becould be
in response to one of these queries?
A. There could be thousands.
Q. And for each of those thousands of
responses does MediaSentry become aware of the
IP address of the computer on which those
files reside?
A. Yes, it does.
And how does MediaSentry know
25 that?Q.
Page i 70
TSG Reporting - Worldwide (877) 702-9580
EXHIBIT IPage 3 of9
10
11
Page 171
1 CONNELLY - CONFIDENTIAL
2 A. It is obtained through the KaZaA
application. The KaZaA network needs to know
what that IP address is in order for other
3
4
5 requests for that file to be downloaded on.
6 So are you saying that it's partQ.
7 of the normal KaZaA functionality to know that
8 IP address?
9 Yes, it is.A.
Q. And is that IP address transmi tted
is that IP addressin any way that
12 transmi tted?13
14
15
A. It's transmitted across the
network, yes.
17
16 see it?Q. And in what manner did MediaSentry
19
18 that were retrieved.A. By inspecting the data packets
20
21
22
23
24
25
Q. Can you explain that a little bit
more slowly.A. Okay. When this -- when the
search is executed over the network and the
data is retrieved for the application, the
MediaSentry software analyzes the data packets
that consisted of those responses and extracts
TSG Reporting - Worldwide (877) 702.9580
EXHIBIT IPage 4 of9
1
Page i 72
3
the IP addressee for each one of those
CONNELLY - CONFIDENTIAL
2
responses.4 Q.
5 to see this?6 A.
7 user could download off the internet. A
A standard application that any
And what tool did MediaSentry use
8 compact fil ter application.
Do you happen to know the name of9 Q.
10 the application?
WinPcap.11 A.
12 Q.
13 reporter.14 A.
15 Q.
Can you spell that for the
W-i-n-P-c-a-p.Now, you mentioned that you would
then only focus on US I P addres ses . Did I get
17 that right?16
18 A.
19 Q.
20 what was a US address versus what was not a US
21 address?
22 A.
23 registries.24 Q.
25 little more slowly.
Could you walk me through that a
Yes.
And how exactly did you determine
Based on the public internet
TSG Reporting - Worldwide (817) 702-9580
EXHIBIT IPage 5 of9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
CONNELLY - CONFIDENTIAL
2 the KaZaA application is still running on that
Page 179
3 computer.4 It then ini tiates the directory
browse and ensures that the packets that are5
6 received consisting of the directory browse
7 data is of that from the IP address that's the
8 target.9 It then initiates the download of
all the files in which case that IP address is
then verified to make sure that each one of
those data packets received is of the target
IP address.
And then, finally, when the
downloads are initiated it imposes that
firewall in which no other data could possibly
retrieve other than by that IP address.
Q. Is it only by means of WinPcap
that you identify an IP address or is there
some other way that you also are seeing the I Paddress in addition to WinPcap?
A. There are addi tional methods of
viewing the I P address.Q. What is that?
A. There is a . dat file which is a
TSG Reporting. Worldwide (877) 702-9580
EXHIBIT IPage 6 of9
10
11
12
15
16
18
19
20
21
22
23
24
25
1 CONNELLY - CONFIDENTIAL
Page 180 .
2 file that's created by the KaZaA application
and stores information in order for the KaZaA3
4 application to be able to obtain files on the
5 network. That .dat file contains the IP6 addres s of the user.
7 Q. Where does that . dat file reside?A. It's stored on the computer's hard8
9 dri ve. On the MediaSentry' shard drive when
it's using the KaZaA application.
Q. Can you wal k me through that a
Ii t tIe bit more slowly. What causes the . dat13 file to be created and -- what causes the . dat
14 file to be created?
A. When the MediaSentry software is
automating the KaZaA application, it initiates
17 the download of those files. And the KaZaA
application creates this . dat file on thecomputer which consists of the information
which it needs to perform the download which
contains the user's IP address.
Q. And does MediaSentry have the
ability to read the IP address from that data
file?A. It does.
TSG Reporting. Worldwide (877) 702.9580
EXHIBIT IPage 70f9
10
1.
12
1 CONNELLY - CONFIDENTIAL
2 Q. And for the reporter I suspect
3 .dat file is dot D-A-T; is that correct?
4 A. Tha t 's correct.
5 Q. Now, does that allow for a
6 cross-check between what WinPcap says and what
the .dat file says?7
8 A. Yes, it does.
9 Q. And is that cross-check performed?
A. Yes.
Q. At what stage in the process?
At the stage in which the download
13 of all the files is initiated. And also at
A.
14 the stage in which the complete files are15 downloaded.
16
17
18
19
20
21
Q. Now, the software that you
supported, to your knowledge, has anyone at
any time for any reason suggested any possible
flaws in that software?
A. No, they have not.Do you think you would be aware if
23
22 someone had?Q.
24
25
A. Yes.
Page 181 .
Q. Why do you think that?
A. Because the issue would have been
TSG Reporting - Worldwide (877) 702-9580
EXHIBIT IPage 8 of9
10
11
12
13
14
15
16
17
18
19
20
21
22
1
2 CERTIFICATESTATE OF NEW YORK
Page 191
3
4 ss.5 COUNTY OF NEW YORK
6 I, FRANCIS X. FREDERICK, a Notary
Public wi thin and for the State of New7
8 York, do hereby certify:
That CHRISTOPHER CONNELLY, the9
wi tness whose deposition is hereinbefore
set forth, was duly sworn by me and that
such deposition is a true record of the
testimony given by the witness.I further certify that I am not
related to any of the parties to this
action by blood or marriage, and that I
am in no way interested in the outcome
of this matter.
IN WITNESS WHEREOF, I have
hereunto set my hand this 1st day of
June, 2009. ~~23
24 FRANCIS X. FREDERICK
25
TSO Reporting - Worldwide (877) 702-9580
EXHIBIT IPage 90f9